“Russia Targeted Election Systems in All 50 States, Report Finds”, read the headline of a New York Times article published on July 25, 2019. In it, the Times asserted as fact that, during the 2016 US presidential election season, the Russian government attempted to hack into state election infrastructure. The leading potential motive provided for this alleged activity was to tamper with vote tallies to throw the election to the Republican candidate, Donald Trump. In the state of Illinois, the Times tells us, Russia succeeded in penetrating the system, although there’s admittedly no evidence that any voting data was altered.
The problem is that, despite asserting as proven fact that Russia hacked or attempted to hack into US electoral systems, the Times presents no evidence to support that sensational claim. Instead, as is its habit, the Times unquestioningly parroted claims made by government officials, without evidence, as though verified truths. Just as it did prior to the Iraq War, the Times has chosen to propagate a conspiracy theory that serves various political agendas, rather than to properly inform the public.
The report mentioned in the headline, released earlier that day, was from the Senate Intelligence Committee. As the Times informs us, the Committee concluded “that election systems in all 50 states were targeted by Russia in 2016, an effort more far-reaching than previously acknowledged and one largely undetected by the states and federal officials at the time.”
This is reminiscent of another Times article published on September 1, 2017, titled “Russian Election Hacking Efforts, Wider Than Previously Known, Draw Little Scrutiny”, which alleged that the Russian government had successfully hacked into North Carolina’s electoral infrastructure.
In that article, however, as I have previously detailed (see my Foreign Policy Journal article “New York Times Propagates Russia Hacking Conspiracy Theory”), the Times likewise had presented no evidence that there was any hacking of US election infrastructure by the Russian government at all. On the contrary, the Times attributed the claim to government officials and informed us that the supposed evidence was “classified”.
The key source cited by the Times to support its conclusion was a classified report by the National Security Agency (NSA) that had been leaked to The Intercept. But what that NSA report actually showed was that the identity of the suspicious actors was unknown. The NSA judged that they were “Probably within” the Russian intelligence agency abbreviated in English as “GRU” (Glavnoye Razvedyvatelnoye Upravlenie, translated “Main Intelligence Administration”). The basis provided for this conclusion was that these actors “utilized some techniques that were similar to other Russian GRU cyber operations units”. The NSA, in other words, didn’t know that the Russian government was trying to hack US election systems; it was just guessing that this was so on a rather flimsy evidentiary basis.
Likewise, in its more recent propagation of the conspiracy theory, the New York Times relays claims from the Senate report as though fact, even though there’s not a single shred of evidence within the report itself supporting the claim that actors operating on behalf of the Russian government hacked or attempted to hack into state election systems.
Indeed, to the contrary, information contained in the Senate report seriously calls into question the credibility of the claim that is being made by government officials and falsely reported by the New York Times’ headline as a demonstrated fact.
The Senate Report’s Lack of Supporting Evidence
As the Times itself notes, the Senate Intelligence Committee report has “substantial” redactions. Nowhere in the unredacted portions of the report is there any evidence to support its central claim that “The Russian government directed extensive activity, beginning in at least 2014 and carrying into at least 2017, against U.S. election infrastructure at the state and local level.”
Despite this alleged Russian activity, the Senate Committee acknowledged having seen “no evidence that any votes were changed or that any voting machines were manipulated.” Furthermore, there is “no evidence of Russian actors attempting to manipulate vote tallies on Election Day”.
According to the Senate report, “In June 2016, Illinois experienced the first known breach by Russian actors of state election infrastructure during the 2016 election.” By the end of 2018, “the Russian cyber actors had successfully penetrated Illinois’ voter registration database” and exfiltrated “an unknown quantity of voter registration data.”
But while asserting as fact that “Russian actors” were responsible, the Senate report makes clear that this is merely an opinion: the DHS had assessed “with high confidence that the penetration was carried out by Russian actors.”
Furthermore, the Executive Director of the Illinois State Board of Elections, Steve Sandvoss, testified to the Senate Committee in June 2017 only that an unidentified “foreign actor” had “successfully penetrated Illinois’s databases”, and that “Illinois still had not been definitively told that Russia perpetrated the attack, despite DHS’s high confidence.”
The Senate report alleges that “GRU cyber actors breached election infrastructure” in a second unidentified state, but this section is heavily redacted and includes no supporting evidence. On the contrary, the report contradictorily notes that “State 2’s Secretary of State and Election Director told the Committee in December 2017 that there was ‘never an attack on our systems.’ ‘We did not see any unusual activities. I would have known about it personally.’”
The report also makes clear that the principle basis for the allegation that “Russian government-affiliated cyber actors conducted an unprecedented level of activity against state election infrastructure in the run-up to the 2016 U.S. elections” was related to reporting from the Federal Bureau of Investigation (FBI) about suspicious activity identified as having come from certain internet protocol (IP) addresses.
On August 18, 2016, the FBI alerted “state technical-level experts” to “suspect IP addresses” identified from an attack on voter registration databases in Illinois. In that alert, the FBI “did not attribute the attack to Russia”.
Further into the report, the Senate Committee nevertheless asserts that these IP addresses “provided some indications the activity might be attributable to the Russian government, particularly the GRU” (emphasis added).
That statement is followed by several bullet points, but those are mostly blacked out, and there is nothing presented in the way of evidence in the unredacted parts of the report that any of the IP addresses were in any way associated with actors connected to the Russian government.
Following the FBI alert, in October 2016, the Department of Homeland Security (DHS) requested the states “to review their log files to determine if the IP addresses” shared by the FBI “had touched their infrastructure.” From the responses, DHS determined that there were twenty additional states “whose networks had made connections to at least one IP address listed”. Later, the Senate report indicates, the conclusion was drawn by DHS officials that all fifty states had been targeted.
On January 6, 2017, the Office of the Director of National Intelligence (DNI) published a declassified version of a report judging that “Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards DHS assesses that the types of systems Russia actors targeted or compromised were not involved in vote tallying.” But the declassified version contained no supporting evidence for that assessment.
The Senate Intelligence Committee states in its report that it “concurs with this assessment” and “found that Russian-affiliated cyber actors gained access to election infrastructure systems across two states, including successful extraction of voter data.” But like the DNI report, no evidence is forthcoming in the Senate report.
On June 21, 2017, the Acting Director of the Cyber Analysis Division of the DHS, Dr. Samuel Liles, told the Senate Intelligence Committee that “internet-connected election-related networks in 21 states were potentially targeted by Russian government cyber actors” (emphasis added). Dr. Liles thus revealed that this was merely a suspicion, not a fact demonstrated conclusively by available evidence.
Then in October, the FBI and DHS issued another alert once again flagging “suspect IP addresses, many unrelated to Russia.” While this implies that at least some were related to Russia, the fact that an IP address might be “related to Russia” tells us nothing more than where the connecting computer or server was located—or appeared to be located, if proxy servers were used. It tells us nothing about the identity of the actors at the other end of those internet connections.
A year later, on October 11, 2018, DHS assessed that targeting of election infrastructure was ongoing, but did not attribute this activity to Russia. Rather, the DHS intelligence assessment stated, “We have not attributed the activity to any foreign adversaries, and we continue to work to identify the actors behind these operations.”
Importantly, the Senate report states that “The majority of information examined by DHS was provided by the states themselves.” Yet the report also makes clear that the states themselves, with knowledge of that same information, were not as convinced as the DHS that the Russian government was responsible for attacks on electoral infrastructure. Rather, the same information relied upon by the DHS to arrive at its conclusion that Russia was responsible was viewed by the states as unextraordinary.
“For most states,” the Committee states further into the report, “the story of Russian attempts to hack state infrastructure was one of confusion and a lack of information.” States had interpreted the FBI’s August 2016 alert “as an insignificant event”. When the additional alert came from the DHS in October specifying IP addresses to watch for in website visitor logs, the DHS did not identify any as being associated with Russia or any other state actors. To state technical staff who received the notification, far from being anything out of the ordinary, “it was a few more suspect IP addresses among the thousands that were constantly pinging state systems.” To them, the threat identified by the DHS was not “any different than any other scanning or hacking attempt”, and since there was no apparent cause for concern, they saw no reason to relay the information to state election officials.
Moreover, “For most state election officials, concerns about a possible threat against election systems dropped off the radar until the summer or fall of 2017. Many state election officials reported hearing for the first time that Russian actors were responsible for scanning election infrastructure in an estimated 21 states from the press or from the Committee’s open hearing on June 21, 2017.”
To hear for the first time many months after the presidential election that their electoral systems may have been targeted by Russian hackers naturally confused state officials, and they sought additional details. So, in September 2017, the DHS held a conference call with representatives from all fifty states—but still did not identify which states were among the twenty-one identified as having been targeted. Officials from one state described the call as “somewhat antagonistic.” Officials from another state said the call “just showed how little DHS knew about elections.”
The DHS subsequently followed up with states individually. Consequently, “Officials from some states reported being shocked that they were in fact one of the states, and further surprised that their states had supposedly been notified.”
Accordingly, the DHS “faced a significant trust deficit” with the states. Another cause of distrust was a proposal by the DHS to designate state electoral systems as “critical infrastructure”. Some states were “suspicious”, the Senate report notes, that this move was “a first step toward a federal takeover of elections.”
Despite efforts by the DHS to “build relationships with the state”, states reported “that DHS seemed to have little to no familiarity with elections.” Officials from one state “said that the DHS representatives they were assigned seemed to know nothing” about their state. Officials from another state complained that “we are spending a ton of time educating outside groups on how elections are run.” Officials from yet another state said, “DHS didn’t recognize that securing an election process is not the same as securing a power grid.”
That latter complaint was particularly ironic, inasmuch as it was presumably a reference to another claim that had originated from the DHS, in late 2016, which was that the Russian government had successfully hacked into the US power grid—a false claim that was swiftly debunked almost as soon as it was reported.
The Power Grid Hack That Never Was
The New York Times characterizes the Senate report as showing that Russia’s efforts to hack state electoral systems were “more far-reaching than previously acknowledged”. But not only does the Times present no evidence to support the claim that Russian hacking efforts were more far-reaching; it also ignores the fact that there has never been any evidence presented to the public to support the claim that the Russian government was responsible for any hacking of electoral systems at all.
In addition to ignoring indications within the Senate report itself that the assessment of the DHS may not have as strong an evidentiary basis as we are supposed to believe, the Times also relegates to the memory hole the whole Vermont power grid episode.
That episode, too, showed precisely why we cannot trust unevidenced claims made by government officials and relayed to the public as though proven fact by the media. News media consumers must learn to be wary of deceitful propaganda intended to manipulate public opinion in furtherance of political agendas. So let’s review the documentary record.
At 7:55 pm on December 30, 2016, the Washington Post published an article titled “Russian hackers penetrated U.S. electricity grid through a utility in Vermont, U.S. officials say”. It told the tale of how Russian hackers who had earlier conducted a hacking operation dubbed “Grizzly Steppe” had also now hacked into the computer system of a Vermont power utility company. Citing anonymous government officials, the Post characterized this alleged Russian hack as constituting a “penetration of the nation’s electrical grid”.
According to the story, federal government officials had alerted state utility companies to the use of malicious software, or “malware”, in the Grizzly Steppe operation, and the allegedly hacked Vermont utility had subsequently identified that malware code in its system.
Within hours of the story’s publication, at 9:37 pm, the Vermont utility in question, the Burlington Electric Department, issued a statement contradicting the Post’s sensational claim. The utility company stated that, the night before, the DHS had alerted US utilities to “a malware code used in Grizzly Steppe”, and a scan of their systems had “detected the malware in a single Burlington Electric Department laptop not connected to our organization’s grid systems.” Consequently, the utility “alerted federal officials of this finding.”
But the false claim, attributed to federal officials, that Russia had hacked into the US power grid had already gone viral.
Early the next morning, the Post article was updated online with an expanded version still claiming that Russians had hacked into the power grid. Among the additions was a link to a joint analysis report by the DHS and Federal Bureau of Investigation (FBI) describing the “Grizzly Steppe” operation. Another addition was the statement that “President-elect Donald Trump has repeatedly questioned the veracity of U.S. intelligence pointing to Russia’s responsibility for hacks in the run-up to the Nov. 8 election. He has also spoken highly of Russian President Vladimir Putin, despite President Obama’s suggestion that the approval for hacking came from the highest levels of the Kremlin.”
While the Post reported it as a proven fact that Russian hackers had penetrated the US power grid and characterized Trump as unreasonably obstinate in denying the facts, ironically, the Post article itself illustrated precisely why Trump was right to question the credibility of claims being made about Russian hacking.
Within hours, the Post began quietly backtracking its central sensational claim that Russian hackers had gained access to the US power grid. Another update was made early on the morning of December 31 so that now, instead of stating that government officials expressed concern that “the penetration of the nation’s electrical grid is significant because it represents a potentially serious vulnerability”, the claim that the grid was penetrated was removed. In the updated version of the sentence, the anonymous officials expressed concern that “the discovery underlines the vulnerabilities of the nation’s electrical grid.”
The headline, however, continued to proclaim that, according to the anonymous government officials, “Russian hackers penetrated U.S. electricity grid” through the Vermont utility.
By around noon, the article had again been updated, though, to completely remove the claim that the grid had been accessed. Now, the headline read, “Russian operation hacked a Vermont utility, showing risk to U.S. electrical grid security, officials say”. The original title was betrayed by the webpage URL, though, which still included “russian-hackers-penetrated-us-electricity-grid”.
While there were no notices of correction included with any of those updates, by evening, the article had been updated to include the following editor’s note at the foot: “An earlier version of this story incorrectly said that Russian hackers had penetrated the U.S. electric grid. Authorities say there is no indication of that so far. The computer at Burlington Electric that was hacked was not attached to the grid.”
By 9:30 am the next day, January 1, 2017, the Post had moved the note of correction from the bottom to the top of the article.
But the story that Russia had hacked the US power grid had already gone viral, contributing to hysterical anti-Russia sentiment that had been growing across the country due to claims of Russia hacking operations intended in part to throw the election away from the Democratic candidate, Hillary Clinton, and toward the Republican candidate, Donald Trump.
A rare honest journalist, Glenn Greenwald, exposed the propaganda narrative in an article for The Intercept on December 31, 2016—as the Post was still in the process of updating its article. Greenwald pointed out that “the key scary claim of the Post story—that Russian hackers had penetrated the US electric grid—was false. All the alarmist tough-guy statements issued by political officials who believed the Post’s claim were based on fiction.”
“Even worse,” Greenwald continued, “there is zero evidence that Russian hackers were even responsible for the implanting of this malware on this single laptop. The fact that malware is ‘Russian-made’ does not mean that only Russians can use it; indeed, like a lot of malware, it can be purchased (as Jeffrey Carr has pointed out in the DNC hacking context, assuming that Russian-made malware must have been used by Russians is as irrational as finding a Russian-made Kalashnikov AKM rifle at a crime scene and assuming the killer must be Russian).”
At the time of Greenwald’s writing, the Post had already changed its headline to remove the claim that the power grid had been hacked, but the title was “still absurd” since there was no evidence “that this malware was placed by a ‘Russian operation’”.
Neither did the joint analysis report by the DHS and FBI that the Post had linked to contain any supporting evidence. In that report, published a day before the Post article, the two government agencies described a range of “malicious cyber activity” that they had dubbed “GRIZZLY STEPPE”. They attributed this activity to “Russian civilian and military intelligence Services (RIS)”, but the report contains no information as to how it was determined that the cyber actors responsible for the activity were working for Russian intelligence.
Furthermore, the report advised state network administrators to flag certain IP addresses as potentially suspicious activity with the explicit caveat that, “Upon reviewing the traffic from these IPs, some traffic may correspond to malicious activity, and some may correspond to legitimate activity.” (Emphasis added.)
On January 2, the Post published another article completely reversing its initial claim. “Russian government hackers do not appear to have targeted Vermont utility, say people close to investigation”, the headline admitted.
“As federal officials investigate suspicious Internet activity found last week on a Vermont utility computer,” the article began, “they are finding evidence that the incident is not linked to any Russian government effort to target or hack the utility, according to experts and officials close to the investigation.”
As the Post explained it, a Burlington Electric Department employee checking his email “triggered an alert indicating that his computer had connected to” an IP addresses that government authorities had associated with Russian hackers alleged to have “infiltrated the Democratic Party.”
But, now, government officials were admitting that “it is possible that the traffic is benign, since this particular IP address is not always connected to malicious activity.”
Evidently, malware was discovered on the laptop, but no information was presented to suggest that this was in any way related to the computer establishing a connection with the flagged IP address. On the contrary, investigators had “found on the device a package of software tools commonly used by online criminals to deliver malware. The package, known as Neutrino, does not appear to be connected with Grizzly Steppe, which U.S. officials have identified as the Russian hacking operation.”
Tellingly, the security software company Malwarebytes describes Neutrino as “a malicious tool kit, which can be used by attackers who are not experts on computer security. Threat actors can have zero coding experience and still use exploit kits like Neutrino to conduct their illegal activity.”
In other words, the use of this malware does not require Russian intelligence operatives.
Furthermore, regarding the joint report by the DHS and FBI, the Post reported, “At least 30 percent of the IP addresses listed were commonly used sites such as proxy servers used to mask a user’s location, and servers run by Amazon.com and Yahoo.”
The utility company employee’s email address was a Yahoo account, which benignly explained why the alert was triggered.
The Post also cited security experts criticizing the government agencies for their report. Robert M. Lee, chief executive of the cybersecurity firm Dragos, pointed out that “nothing in there was specifically descriptive of Russian activity.” Further down the page, the Post added, “The IP address information alone is not useful, experts noted. Moreover, a server that is used by Russian spies one year might be used by ‘granny’s bake shop’ the next, Lee said.”
The Post also quoted Dmitri Alperovitch, chief technology officer of CrowdStrike, the company that was hired by the Democratic National Committee (DNC) to investigate the hacking of its servers, which the company attributed to the Russian government. (Despite this claim being constantly repeated as proven fact by the government and media, the FBI never verified the conclusion by doing its own forensic analysis of the DNC servers.) “No one should be making any attribution conclusions purely from the indicators in the [government] report,” Alperovitch had said in a Twitter post.
In sum, the viral claim that Russian intelligence had hacked into the US electrical grid was completely false. The grid had not been hacked. The IP address that triggered the alert of suspicious activity belonged to a Yahoo server, not the computer of some Russian hacker. And the malware that was found on the laptop was evidently already there and had nothing to do with Russian intelligence.
The Impact of Anti-Russia Propaganda
The anti-Russia propaganda emanating from within the government and dutifully broadcast to the public via the major media was having its evidently intended effect. A public opinion survey conducted by YouGov and published just three days before the false Post story about Russia hacking the US power grid found that half of Americans who voted for Hillary Clinton in the election believed that Russia had successfully hacked into electoral systems to tamper with the vote tallies in favor of Trump.
Despite the complete absence of evidence, a YouGov survey conducted earlier this year, in March 2019, found that 41 percent of US adult citizens are convinced that “Russia tampered with vote tallies in order to get Donald Trump elected President”.
Ironically, the same day the Post was propagating its false conspiracy theory about Russia hacking the power grid, it also reported the results of the 2016 poll in a separate article, commenting that the survey “confirms what we know from numerous previous polls: Many Americans believe dubious conspiracy theories.” Among all respondents, 37 percent believed that “it is at least ‘probably true’ that ‘Russia tampered with vote tallies in order to get Donald Trump elected President”. Among Democrats, this figure rose to 52 percent.
The author reporting these results described the premise accurately as “an improbable claim for which there is no evidence”. He immediately added, though, that “there is extensive evidence that Russian operatives hacked Democratic National Committee e-mails for the purpose of helping Trump”.
But that wasn’t true, either. That claim, too, was rather also a conspiracy theory in support of which no credible evidence had been presented to the public.
To support the claim of this supposedly “extensive evidence”, a link was provided to another Post article from earlier that month. The linked article, from December 16, had reported that “FBI Director James B. Comey and Director of National Intelligence James R. Clapper Jr. are in agreement with a CIA assessment that Russia intervened in the 2016 election in part to help Donald Trump win the White House”. The rest of the article merely parroted the claim being made by various government officials that the Russian government had hacked into the DNC’s computer system. No supporting evidence was offered by the Post to its readers.
The lead author on that December 16 article was Adam Entous, who subsequently coauthored the false Post story about Russians hacking the US power grid.
The December 16 article linked in turn to a December 9 article reporting that, according to anonymous government officials, the Central Intelligence Agency (CIA) had “concluded in a secret assessment that Russia intervened in the 2016 election”.
Adam Entous was the lead author of that article, too, which obviously presented no evidence (since it was “secret”).
Thus, following the trail backward, we can see that the supposed “extensive evidence” that Russia was responsible for hacking the DNC’s systems amounted to nothing more than unevidenced claims being made by government officials.
As Kaveh Waddell more honestly observed in an article published in The Atlantic on January 3, 2017, “Of course, believing that Russia was behind the hacks on Democrats requires trusting the federal government’s ability to make that determination and the truthfulness of its account, as well as the integrity and skill of the security researchers at CrowdStrike, who were hired by the DNC.”
In other words, like the claim that Russia had hacked into the US power grid, the claim that Russia had hacked into the DNC’s systems in order to collect dirt on Hillary Clinton to try to throw the election to Donald Trump was nothing more than a conspiracy theory for which not a shred of actual evidence existed in the public domain.
The Agenda Behind the Government’s Anti-Russia Propaganda
What is clear from the information that is publicly available is that the American people are being propagandized, and many are evidently so blinded by their own political biases that they allow themselves to be duped into believing claims solely as a matter of faith—because they choose to believe it not just despite an absence of evidence, but also in the face of contradictory facts.
This propaganda campaign we’ve been witnessing for several years now is very similar to the propaganda campaign we saw in the runup to the US’s illegal war on Iraq in March 2003, which succeeded in deluding the public into believing that Iraq possessed weapons of mass destruction (WMD) and had ties to Al Qaeda, the terrorist organization that allegedly masterminded the attacks on the World Trade Center towers and the Pentagon on September 11, 2001.
In both cases, we’ve seen the mainstream corporate media parrot claims originating from government officials as though fact, despite a complete absence of publicly available evidence.
This is not because journalists like Adam Entous are in on some grand conspiracy to deliberately deceive the public. It’s simply because journalists and editors are susceptible to their own biases, just like everyone else. Regardless of party affiliation or political perspective, American journalists employed by major media companies tend to serve the interests of the politically and financially powerful. This is because, like most Americans, they are convinced that the US government is generally good; that government officials, despite frequently making “mistakes’, are generally well-meaning; and that the government itself, despite occasionally causing negative unintended consequences, is generally a benevolent force for good in the world.
Journalists and newspaper editors, too, in other words, are strict adherents to what has been described as “the state religion” by famed intellectual Noam Chomsky, who also coauthored with Edward S. Herman the seminal treatise Manufacturing Consent: The Political Economy of the Mass Media. The title of their book was borrowed from Water Lippman, who explained in 1921 how “the manufacture of consent” was achieved by government officials by means of propaganda delivered to the public through the mainstream media.
One can speculate on the political agenda behind this disinformation, but what is also clear is that what is sometimes called the “Deep State”—including but not necessarily limited to the military and intelligence establishment—has had a vested interest in preventing the Trump administration from developing friendlier relations with Russia. Among other potentially motivating factors, these state apparatuses require an outside “enemy” to justify their enormous budgets, and so when no enemies exist, they must be created—at least in the minds of the public.
The Democratic Party, too, has always had a clear motive in deflecting attention away from the inner orchestrations underway to ensure that Clinton would be the presidential nominee, as revealed by the hacked emails from the DNC servers. The perfect red herring by which to accomplish this was to propagate the conspiracy theory that Trump had not legitimately won (in part due the Democratic establishment’s own undemocratic behavior that alienated much of their own base by marginalizing Bernie Sanders), but that Trump had conspired with the Russian government to effectively steal the vote from Clinton, the favored candidate of the political establishment.
As far as the Deep State was concerned, unlike Trump, with campaign rhetoric about friendly relations with Russia and favorable view of President Vladimir Putin, Mrs. Clinton was duly antagonistic toward Russia and its leader and otherwise hawkish in foreign policy, with a strong record of warmongering. Trump had even hinted at ceasing the interventionist policy toward Syria that had been established under Barack Obama’s administration, and which had greatly contributed to the violence and chaos and helped fuel the rise of ISIS—notwithstanding ceaseless propaganda about how the problem in Syria was that the US just wasn’t intervening enough.
This just would not do. The solution was to implement another counterintelligence campaign against the American people. Trump’s election win could not be undone, but he could still be undermined and manipulated, and portraying Trump as soft on a country that had interfered in American democratic processes to help him win was just the thing they needed to pressure him into getting “tougher” on Russia in Syria and elsewhere.
Mainstream media organizations like the New York Times and Washington Post, for their part, have served their typical function of manufacturing consent for existing government policies. The major media seem to have collective amnesia about what the alleged Russian hack of the DNC actually revealed, which was how officials within the Democratic Party were colluding to ensure that the Democratic nominee competing against Trump in the election would be Hillary Clinton and not Bernie Sanders.
It should also not be forgotten that the firm CrowdStrike received payment from the DNC for its investigation concluding that the DNC had been hacked by Russia, and that the FBI never conducted its own forensic investigation to corroborate the claim originating from CrowdStrike that Russian intelligence operatives were responsible for that information getting out.
The lesson to be learned from the whole Iraq War debacle is simple: never believe what you are told simply because government officials claim it to be so. Yet the major media corporations seem perplexingly reluctant to learn that lesson, instead persisting in their habit of relaying as though proven fact unevidenced claims originating from sources who are committed to serving their own various political agendas.
The failure of both the media and American society in general to learn that lesson has since perhaps never been more starkly illustrated than with the case of the alleged Russian “hacking” of the 2016 presidential election.
Republished from foreignpolicyjournal.com.
 David E. Sanger and Catie Edmondson, “Russia Targeted Election Systems in All 50 States, Report Finds”, New York Times, July 25, 2019, https://www.nytimes.com/2019/07/25/us/politics/russian-hacking-elections.html.
 Nicole Perlroth, Michael Wines, and Matthew Rosenberg, “Russian Election Hacking Efforts, Wider Than Previously Known, Draw Little Scrutiny”, New York Times, September 1, 2017, https://www.nytimes.com/2017/09/01/us/politics/russia-election-hacking.html.
 Jeremy R. Hammond, “New York Times Propagates Russia Hacking Conspiracy Theory”, Foreign Policy Journal, September 6, 2017, https://www.foreignpolicyjournal.com/2017/09/06/new-york-times-propagates-russia-hacking-conspiracy-theory/.
 United States Senate, Report of the Select Committee on Intelligence, United States Senate, on Russian Active Measures Campaigns and Interference in the 2016 U.S. Election. Volume 1: Russian Efforts Against Election Infrastructure With Additional Views, redacted version released July 25, 2019, https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume1.pdf.
 Office of the Director of National Intelligence, “Background to ‘Assessing Russian activities and Intentions in Recent US Elections’: The Analytic Process and Cyber Incident Attribution”, January 6, 2017, https://www.dni.gov/files/documents/ICA_2017_01.pdf.
 Juliet Eilperin and Adam Entous, “Russian hackers penetrated U.S. electricity grid through a utility in Vermont, U.S. officials say”, Washington Post, December 30, 2016; archived December 31, 2016, at 01:16:22, https://web.archive.org/web/20161231011622/https://www.washingtonpost.com/world/national-security/russian-hackers-penetrated-us-electricity-grid-through-a-utility-in-vermont/2016/12/30/8fc90cc4-ceec-11e6-b8a2-8c2a61b0436f_story.html.
 Burlington Electric Department, “Burlington Electric Department Statement in Response to Reports of Russian Hacking of Vermont Electric Grid”, Facebook.com, December 30, 2016, https://www.facebook.com/burlingtonelectric/photos/a.224345104256173/1397000940323911/.
 Eilperin and Entous, “Russian hackers”, archived December 31, 2016, at 02:24:38, https://web.archive.org/web/20161231022438/https://www.washingtonpost.com/world/national-security/russian-hackers-penetrated-us-electricity-grid-through-a-utility-in-vermont/2016/12/30/8fc90cc4-ceec-11e6-b8a2-8c2a61b0436f_story.html?utm_term=.e7017e6b27da.
 Ibid., archived December 31, 2016, at 03:06:08, https://web.archive.org/web/20161231030608/https://www.washingtonpost.com/world/national-security/russian-hackers-penetrated-us-electricity-grid-through-a-utility-in-vermont/2016/12/30/8fc90cc4-ceec-11e6-b8a2-8c2a61b0436f_story.html.
 Juliet Eilperin and Adam Entous, “Russian operation hacked a Vermont utility, showing risk to U.S. electrical grid security, officials say”, Washington Post, December 30, 2016; archived December 31, 2016, at 12:03:37, https://web.archive.org/web/20161231120337/https://www.washingtonpost.com/world/national-security/russian-hackers-penetrated-us-electricity-grid-through-a-utility-in-vermont/2016/12/30/8fc90cc4-ceec-11e6-b8a2-8c2a61b0436f_story.html.
 Ibid., archived December 31, 2016, at 19:18:29, https://web.archive.org/web/20161231191829/https://www.washingtonpost.com/world/national-security/russian-hackers-penetrated-us-electricity-grid-through-a-utility-in-vermont/2016/12/30/8fc90cc4-ceec-11e6-b8a2-8c2a61b0436f_story.html?utm_term=.e2b8b7bfdd5d.
 Ibid., archived January 1, 2016, at 09:29:42, https://web.archive.org/web/20170501000000*/https://www.washingtonpost.com/world/national-security/russian-hackers-penetrated-us-electricity-grid-through-a-utility-in-vermont/2016/12/30/8fc90cc4-ceec-11e6-b8a2-8c2a61b0436f_story.html.
 Glenn Greenwald, “Russia Hysteria Infects WashPost Again: False Story About Hacking U.S. Electric Grid”, The Intercept, December 31, 2016, https://theintercept.com/2016/12/31/russia-hysteria-infects-washpost-again-false-story-about-hacking-u-s-electric-grid/. Note: my quotation is not verbatim as “Kalashnikov” was misspelled “Kalishnikov” in the original.
 US Department of Homeland Security and Federal Bureau of Investigation, “GRIZZLY STEPPE – Russian Malicious Cyber Activity”, Joint Analysis Report, December 29, 2016, https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf.
 Ellen Nakashima and Juliet Eilperin, “Russian government hackers do not appear to have targeted Vermont utility, say people close to investigation”, Washington Post, January 2, 2017, https://www.washingtonpost.com/world/national-security/russian-government-hackers-do-not-appear-to-have-targeted-vermont-utility-say-people-close-to-investigation/2017/01/02/70c25956-d12c-11e6-945a-76f69a399dd5_story.html.
 Malwarebytes, “Neutrino”, June 9, 2016, https://blog.malwarebytes.com/threats/neutrino/.
 Nakashima and Eilperin, “Russian government hackers”, op. cit.
 Kathy Frankovic, “Belief in conspiracies largely depends on political identify”, YouGov, December 27, 2016, https://today.yougov.com/topics/politics/articles-reports/2016/12/27/belief-conspiracies-largely-depends-political-iden. The Economist/YouGov Poll, December 17 – 20, 2016, https://d25d2506sfb94s.cloudfront.net/cumulus_uploads/document/ljv2ohxmzj/econTabReport.pdf.
 The Economist/YouGov Poll, March 24 – 26, 2019, https://d25d2506sfb94s.cloudfront.net/cumulus_uploads/document/6ujvi5p8z1/econTabReport.pdf.
 Ilya Somin, “Political ignorance, partisan bias, and belief in conspiracy theories”, Washington Post, December 30, 2016, https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/12/30/political-ignorance-partisan-bias-and-belief-in-conspiracy-theories/.
 Adam Entous and Ellen Nakashima, “FBI in agreement with CIA that Russia aimed to help Trump win White House”, Washington Post, December 16, 2016, https://www.washingtonpost.com/politics/clinton-blames-putins-personal-grudge-against-her-for-election-interference/2016/12/16/12f36250-c3be-11e6-8422-eac61c0ef74d_story.html.
 Adam Entous, Ellen Nakashima, and Greg Miller, “Secret CIA assessment says Russia was trying to help Trump win White House”, Washington Post, December 9, 2016, https://www.washingtonpost.com/world/national-security/obama-orders-review-of-russian-hacking-during-presidential-campaign/2016/12/09/31d6b300-be2a-11e6-94ac-3d324840106c_story.html?hpid=hp_hp-top-table-main_russiahack-745p%3Ahomepage%2Fstory&tid=a_inl&utm_term=.b5901f50c0be.
 Kaveh Waddell, “Don’t Read Too Much Into the Vermont Hack Debacle”, The Atlantic, January 3, 2017, https://www.theatlantic.com/technology/archive/2017/01/the-vermont-hack-debacle-doesnt-mean-attributing-cyberattacks-is-impossible/512078/. Note: my quotation is not verbatim as the original had miswritten the company’s name as “Crowdstrike”, with a lowercase instead of uppercase “S”.
 The mainstream media to this day also persist in the claim that fact the government’s claims about Iraq were false can be attributed to an “intelligence failure”, but this is just more propaganda. In fact, there was no intelligence failure. Rather, there was a very highly successful counterintelligence success, i.e., a successful propaganda campaign intended to manufacturer public consent for the planned war. See: Jeremy R. Hammond, “The Lies that Led to the Iraq War and the Persistent Myth of ‘Intelligence Failure’”, Foreign Policy Journal, September 8, 2012, https://www.foreignpolicyjournal.com/2012/09/08/the-lies-that-led-to-the-iraq-war-and-the-persistent-myth-of-intelligence-failure/.
 For more on how the media serve this function, see: Jeremy R. Hammond, “The Role of the US Media in the Palestine Conflict”, Foreign Policy Journal, September 20, 2016, https://www.foreignpolicyjournal.com/2016/09/20/the-role-of-the-us-media-in-the-palestine-conflict/.
 Jeremy R. Hammond, “U.S. Policy Is To Prolong the Violence in Syria”, Foreign Policy Journal, September 24, 2013, https://www.foreignpolicyjournal.com/2013/09/24/u-s-policy-is-to-prolong-the-violence-in-syria/. Jeremy R. Hammond, “How the CIA Helped Fuel the Rise of ISIS”, JeremyRHammond.com, January 29, 2016, https://www.jeremyrhammond.com/2016/01/29/cia-helped-fuel-rise-isis/. Jeremy R. Hammond, “The Fictional MSM Narrative of Obama’s ‘Reluctance’ to Intervene in Syria”, JeremyRHammond.com, April 29, 2015, https://www.jeremyrhammond.com/2015/04/29/the-fictional-msm-narrative-of-obamas-reluctance-to-intervene-in-syria/.
 Michael D. Shear and Matthew Rosenberg, “Released Emails Suggest the D.N.C. Derided the Sanders Campaign”, New York Times, July 22, 2016, https://www.nytimes.com/2016/07/23/us/politics/dnc-emails-sanders-clinton.html. Associated Press, “Leaked DNC emails reveal details of anti-Sanders sentiment”, The Guardian, July 24, 2016, https://www.theguardian.com/us-news/2016/jul/23/dnc-emails-wikileaks-hillary-bernie-sanders.